Privacy Preserving Data Aggregation
Scheme for Mobile Edge Computing
Assisted IoT Applications
BACHELOR OF TECHNOLOGY in
COMPUTER SCIENCE AND ENGINEERING.
The Project report review submitted by:
Y G HEMA 15781A05B0
DILMUROD TASHPULATOV 15781A05D8
BIJAYA TWANABASU 15781A05B9
SENGATHITH KEOMUANVONG 15781A05D5
Under the Guidance of:
Mr. M.BALASUBRAMANIYAN ,
Assistant Professor, Department of CSE
Content
1. Introduction
2. Literature survey
3. System analysis
4. Scope and proposed approach
5. Implementation and result
6. Conclusion
7. Questions Please!!!!!!
1. Introduction
Rapid development of 5G and Internet of Things (IoT)
techniques
Traditional architecture of the cloud computing cannot
satisfy the requirements
IoT terminal devices will send the data to cloud server
through edge server.
there are three participants in our model, i.e. terminal
device, edge server and public cloud center.
IoT generates, encrypts and transmits to the edge server
1. Introduction
Edge server serves as a gate way between cloud sercer and
user
Data will be encrypted in the cloud server to ensure the
safety of the data.
Our scheme data privacy, source authentication, integrity
and efficiency.
2. Literature Survey
In 2014, Roy et al. proposed and synopsis diffusion based secure data
aggregation for ring topology addressing communication loss problem.
Later, Shin and Park presented a homomorphic encryption based data
aggregation scheme for heterogeneous clustered WSN; it can resist some
attacks, but cannot ensure the integrity of the data.
Recently, by employing identity-based cryptography, Shen et al. proposed a
secure data aggregation for WSN, which mainly solved coalition attack.
2. Literature Survey
In 2013, Zhang et al. proposed a verifiable privacy preserving aggregation
scheme (PPAS) for urban sensing systems.
Later, Li et al. proposed an efficient PPAS in mobile sensing, which
adopted the idea of multi-secret sharing.
In 2016, Jin et al. proposed a privacy-preserving data aggregation
framework for mobile sensing system that integrates incentives, data
aggregation, and data perturbation mechanisms.
2. Literature Survey
In 2012, Lu et al. proposed an PPAS for smart grid communication by
using Parlier’s homomorphic encryption. Later, Fan et al. proposed a
PPAS for smart grid to against internal attackers.
Recently, Wang proposed an identity-based data aggregation protocol for
smart grid to against malicious tampering attack.
3. System analysis - Existing Systems
Different organizations have predicted that billions of smart devices will be
connected to the Internet in near future and will generate huge amount of data
Besides, the widespread applications of IoT require the smart devices to have
low latency, high data rate, fast data access for real-time data
processing/analysis and decision making.
However, the traditional cloud computing cannot satisfy these requirements,
and the concept of mobile edge computing (MEC) was proposed by
researchers.
Disadvantages:- high communication cost and unsuitable for meeting
the demands
3. System analysis - Architecture:
Architecture:
3. System analysis - Proposed System:
3. System analysis - Proposed System:
1. Initialization
2. Registration
3. TD data encryption and report
4. ES data aggregation and report
5. Decryption
4. Scope of the project
1. Develop the infrastructure to deliver:
1. security,
2. reliability
3. efficiency
2. Solve the problem that currently threatens to IOT devices
3. The objective is to build the GUI, to deliver the best
experience from ease of manipulation as well as
exploitations, secured from other hackers.
4. Proposed approach
1. Create java based web application, where the dashboard
will be provided for the following category of explicators:
I. CSP ADMIN
II. EDGE ADMIN
III. USER
2. Develop using java EE and Oracle technologies.
3. Give ability for these category of users enough options so
that they will have limited control over the system, with
limited capabilities and access controls
4. Proposed approach - MODULES
1. Terminal Device Module (USER MODULE)
2. Edge Server Module
3. Cloud Server Module
4. Proposed approach – System requirements
H/W System Configuration:-
1. Processor - I3/Intel Processor
2. RAM - 4GB (min)
3. Hard Disk - 160GB
S/W System Configuration:-
1. Operating System Windows 7/8/10
2. Application Server Glassfish server 4.3
3. Front End HTML, JSP
4. Scripts JavaScript.
5. Server side Script Java Server Pages.
6. Database Oracle 10g
7. Database Connectivity JDBC
5. IMPLEMENTATION
1. Sign up and Register
2. Cloud Server Admin Dashboard
3. Edge Server Admin Dashboard
4. User Dashboard
5. IMPLEMENTATION
1. Sign up and Register
In case of register, the system reads the fields such as username,
password, mobile, and email. Then verifies it through its database
so that any collision of token could be avoided and uniqueness of
the user is being established as well as ensured.
In case of login, the email, password as well as the type of the user
is being read and matched against the data available in the database,
then the required access is being granted to a particular user.
5. IMPLEMENTATION
1. Sign up and Register RESULT
5. IMPLEMENTATION
1. Sign up and Register RESULT
5. IMPLEMENTATION
2. Cloud Server Admin Dashboard
There will be provided different opportunities such as add cloud
data center, activate or deactivate the added cloud data center, view
the data center as well as view the purchased data center
In case of adding data center, the exact longitude as well as latitude
will be read from the google api, so that the exact location will be
established regarding the location of the data center,
5. IMPLEMENTATION
1. Cloud Server Admin Dashboard RESULT
5. IMPLEMENTATION
1. Cloud Server Admin Dashboard RESULT
5. IMPLEMENTATION
1. Cloud Server Admin Dashboard RESULT
5. IMPLEMENTATION
1. Cloud Server Admin Dashboard RESULT
5. IMPLEMENTATION
3. Edge Server Admin Dashboard
There will be provided different opportunities such as add edge
cloud data center, activate or deactivate the added edge cloud data
center, and view the status of the edge server.
In case of adding data center, the exact longitude as well as latitude
will be read from the google api, so that the exact location will be
established regarding the location of the data center,
5. IMPLEMENTATION
3. Edge Server Admin Dashboard RESULT
5. IMPLEMENTATION
3. Edge Server Admin Dashboard RESULT
5. IMPLEMENTATION
4. User Dashboard
There will be provided different opportunities such as select cloud
data center cloud data center, remove the selected data center as well
as upload and download file to/from datacenter.
In case of adding uploading or downloading, the data downloaded to
data center will be stored in the secured way and while downloading
it it will be decrypted and returned back to user.
5. IMPLEMENTATION
4. User Dashboard RESULT
5. IMPLEMENTATION
4. User Dashboard RESULT
5. IMPLEMENTATION
4. User Dashboard RESULT
5. IMPLEMENTATION
4. User Dashboard RESULT
5. Conclusion
Mobile edge computing is a new paradigm that complements the could
computing and IoT complement to each other.
We will designed a privacy preserving data aggregation for mobile edge
computing assisted IoT applications based on the homomorphic property of
Boneh-Goh-Nissimcryptosystem or RSA ALGORITHM
The proposed scheme can protect privacy and provide source authentication
and integrity as well as save almost half of the communication cost compared
with traditional method.
Thank you for your attention.
Questions Please !